IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed   
Managing Security Reports
 
Threat Intelligence
sponsored by Infoblox
PRODUCT OVERVIEW: Security organizations are under tremendous pressure to protect their infrastructure from cyberthreats. Threat intelligence can help organizations respond to these threats, however many organizations lack the visibility required to prioritize threats. In this resource, learn how BloxOne Threat Defense can help organizations protect their networks.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

Infoblox

Your Endpoint Security Strategy Needs a Hug
sponsored by Verizon
RESOURCE: Traditional endpoint security has long been a crutch in the fight against hackers, but it just doesn't cut it anymore. Those tools rely on known malware signatures to be effective but they can't defend against zero-day attacks and new ransomware variants. In this blog post, discover 5 areas that you can address to ease your endpoint suffering.
Posted: 24 May 2019 | Published: 24 May 2019

Verizon

The Insider Threat: Real Defense for Real Businesses
sponsored by Proofpoint
WEBCAST: How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, Kate Burnell, Global Insider Threat Specialist at Dtex Systems and Kurt Wescoe, Chief Architect at Wombat Security discuss how cybersecurity professionals can address the insider threat without shutting down business.
Posted: 30 May 2019 | Premiered: Nov 30, 2018

Proofpoint

4 Ways Digital Transformation Can Help the Bottom Line and How a SIEM Can Help
sponsored by Splunk
WHITE PAPER: There are many ways digital transformation can benefit a company. Download this white paper to explore four ways a SIEM solution can help.
Posted: 24 May 2019 | Published: 24 May 2019

Splunk

Telstra security report 2019 – APAC edition
sponsored by Telstra
RESEARCH CONTENT: The latest edition of this Telstra study enables you to benchmark your organization's security posture against other companies in your region. The APAC report also highlights a change in the corporate landscape with the convergence of cyber and electronic security.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Telstra

Light SIEM Doesn't Mean Light Security
sponsored by Interfocus
WHITE PAPER: SIEM is a well-established cybersecurity technology however; they are often too costly and complex for small and medium-sized businesses to deploy. For these businesses, finding an alternative "light" SIEM can provide many benefits of a SIEM without being as costly. In this white paper, explore what to consider when looking at alternative SIEM.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Interfocus

Secureworks Red Cloak Threat Detection and Response Application
sponsored by Dell SecureWorks
RESEARCH CONTENT: Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, and compromise IT assets. This is where threat detection and response come into play. The tools used for these tasks are referred to as security analytics and operations. In this research report, explore the state of the security analytics and operations market.
Posted: 21 May 2019 | Published: 31 May 2019

Dell SecureWorks

TITUS Military Classification Tool
sponsored by TITUS
DATA SHEET: In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

Core Principles of Cyber Hygiene in a World of Cloud and Mobility
sponsored by VMware and Intel
WHITE PAPER: No one wants to be the target of cybercriminals, but are you doing enough to protect your business? Many factors lead to security breaches, but there are 5 core principles that can help ensure you won't be the next victim featured on the nightly news. Download the whitepaper to learn how to address vulnerabilities before they become disastrous.
Posted: 23 May 2019 | Published: 30 Sep 2018

VMware and Intel

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement